Man-in-the-Middle
A Man-in-the-Middle attack occurs when a malicious user inserts themselves into a conversation between two parties. She/he can monitor, alter, and inject messages into a conversation between two parties without their acknowledgement. It can be abbreviated as MITM, MitM, MiM, or MIM. This type of attack deals with real time processing of transactions or transfer of other sensitive data.
Source: FEMA (TEEX)
A Man-in-the-Middle attack occurs when a malicious user inserts themselves into a conversation between two parties. She/he can monitor, alter, and inject messages into a conversation between two parties without their acknowledgement. It can be abbreviated as MITM, MitM, MiM, or MIM. This type of attack deals with real time processing of transactions or transfer of other sensitive data.
Source: FEMA (TEEX)
Comments
Post a Comment